산업 및 시스템 공학과 통신시스템 및 인터넷보안연구실 20075273 김효원 Optimizing Tree Reconfiguration for Mobile Target Tracking in Sensor Networks Wensheng Zhang and Guohong Cao.

Slides:



Advertisements
Similar presentations
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Advertisements

Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Wensheng Zhang and Guohong Cao. Dynamic Convoy Tree-based Collaboration (DCTC) 1. Constructing the Initial Convoy Tree  Apply existing root election.
A Survey on Tracking Methods for a Wireless Sensor Network Taylor Flagg, Beau Hollis & Francisco J. Garcia-Ascanio.
1 Structures for In-Network Moving Object Tracking inWireless Sensor Networks Chih-Yu Lin and Yu-Chee Tseng Broadband Wireless Networking Symp. (BroadNet),
Movement-Assisted Sensor Deployment Author : Guiling Wang, Guohong Cao, Tom La Porta Presenter : Young-Hwan Kim.
“Location-Aided Routing (LAR) in Mobile Ad Hoc Network” by Young-bae ko Nitin H. Validya presented by Mark Miyashita.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
1 School of Computing Science Simon Fraser University, Canada PCP: A Probabilistic Coverage Protocol for Wireless Sensor Networks Mohamed Hefeeda and Hossein.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Yingqi Xu, Wang-Chien Lee Proceedings of the 2004 IEEE International.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Haiyun Luo, Fan Ye, Jerry Cheng, Songwu Lu, Lixia Zhang
1 Mobility-assisted Spatiotemporal Detection in Wireless Sensor Networks Guoliang Xing 1 ; JianpingWang 1 ; Ke Shen 3 ; Qingfeng Huang 2 ; Xiaohua Jia.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
May 14, Organization Design and Dynamic Resources Huzaifa Zafar Computer Science Department University of Massachusetts, Amherst.
1 A Delay-Aware Reliable Event Reporting Framework for Wireless Sensor-Actuator Networks Presented by Edith Ngai Supervised by Prof. Michael R. Lyu Term.
SMART: A Scan-based Movement- Assisted Sensor Deployment Method in Wireless Sensor Networks Jie Wu and Shuhui Yang Department of Computer Science and Engineering.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
Sidewinder A Predictive Data Forwarding Protocol for Mobile Wireless Sensor Networks Matt Keally 1, Gang Zhou 1, Guoliang Xing 2 1 College of William and.
Flooding-Based Geocasting Protocol for Mobile Ad Hoc Network YOUNG-BAE KO NITIN H. VAIDYA.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
A Sweeper Scheme for Localization and Mobility Prediction in Underwater Acoustic Sensor Networks K. T. DharanC. Srimathi*Soo-Hyun Park VIT University Vellore,
IPCCC’111 Assessing the Comparative Effectiveness of Map Construction Protocols in Wireless Sensor Networks Abdelmajid Khelil, Hanbin Chang, Neeraj Suri.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
A Framework for Energy- Saving Data Gathering Using Two-Phase Clustering in Wireless Sensor Networks Wook Chio, Prateek Shah, and Sajal K. Das Center for.
Localization With Mobile Anchor Points in Wireless Sensor Networks
Shih-Chieh Lee 1 Detection and Tracking of Region-Based Evolving Targets in Sensor Networks Chunyu Jiang, Guozhu Dong, Bin Wang Wright State University.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
Benjamin AraiUniversity of California, Riverside Reliable Hierarchical Data Storage in Sensor Networks Song Lin – Benjamin.
Distributed Monitoring and Aggregation in Wireless Sensor Networks INFOCOM 2010 Changlei Liu and Guohong Cao Speaker: Wun-Cheng Li.
VAPR: Void Aware Pressure Routing for Underwater Sensor Networks
Multi-Criteria Routing in Pervasive Environment with Sensors Santhanakrishnan, G., Li, Q., Beaver, J., Chrysanthis, P.K., Amer, A. and Labrinidis, A Department.
EBAS: An Energy-Efficient Event Boundary Approximated Suppression Algorithm in Wireless Sensor Networks Longjiang Guo Heilongjiang University
Selection and Navigation of Mobile sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Problem Wensheng Zhang, Dr. Guohong Cao, and Dr. Tom La Porta Example: Battlefield Surveillance Challenges Small Sensing Range Limitations in sensor nodes.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
KAIS T Distributed cross-layer scheduling for In-network sensor query processing PERCOM (THU) Lee Cheol-Ki Network & Security Lab.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Efficient AOI-Cast for Peer-to-Peer Networked Virtual Environments.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Adaptive Tracking in Distributed Wireless Sensor Networks Lizhi Yang, Chuan Feng, Jerzy W. Rozenblit, Haiyan Qiao The University of Arizona Electrical.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks Jaehyun Kim, Dept. of Electrical & Electronic Eng., Yonsei University;
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
An Energy-Efficient Approach for Real-Time Tracking of Moving Objects in Multi-Level Sensor Networks Vincent S. Tseng, Eric H. C. Lu, & Kawuu W. Lin Institute.
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
Repairing Sensor Network Using Mobile Robots Y. Mei, C. Xian, S. Das, Y. C. Hu and Y. H. Lu Purdue University, West Lafayette ICDCS 2006 Speaker : Shih-Yun.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Wireless Sensor Network Architectures
Presentation transcript:

산업 및 시스템 공학과 통신시스템 및 인터넷보안연구실 김효원 Optimizing Tree Reconfiguration for Mobile Target Tracking in Sensor Networks Wensheng Zhang and Guohong Cao The Pennsylvania State University INFOCOM 2004

Telecommunication System & Internet Security Lab. Outline  Introduction  Overview of DCTC  Optimizing TR Schemes  Root Replacement  OCR(Optimized Complete Reconfiguration)  OIR(Optimized Interception-based Reconfig.)  Performance Evaluation  Conclusion 2

Telecommunication System & Internet Security Lab.  Introduction  Overview of DCTC  Optimizing TR Schemes  Performance Evaluation  Conclusion 3

Telecommunication System & Internet Security Lab. Introduction  Sensor network  Advances in micro-electro-mechanics and wireless communication  Adopted to many military and civil application  Sensor collaboration  limitations of sensor node  Obtain fine-grain, high-precision sensing data 4

Telecommunication System & Internet Security Lab. Introduction  Sensor collaboration issue in target tracking  Sensor node promptly detect target, generate reports and send in fast and energy efficient way  In this paper,  use DCTC framework and optimize tree reconfiguration to minimize energy consumption  propose 2 optimized schemes  OCR(Optimized Complete Reconfiguration)  OIR(Optimized Interception-based Reconfiguration) 5

Telecommunication System & Internet Security Lab.  Introduction  Overview of DCTC  Basic Structure  Details  Problem of Optimizing Tree Reconfiguration  Optimizing TR Schemes  Performance Evaluation  Conclusion 6

Telecommunication System & Internet Security Lab. Overview of DCTC  Dynamic Convoy Tree-based Collaboration  Basic structure of DCTC 7

Telecommunication System & Internet Security Lab. Overview of DCTC  Dynamic Convoy Tree-based Collaboration  Construct Initial Convoy Tree 8 Target Enters the detection region Nodes close to target construct initial convoy tree by selecting root using root election algorithm The other node in monitoring region are added to convoy tree

Telecommunication System & Internet Security Lab. Overview of DCTC  Dynamic Convoy Tree-based Collaboration  Collecting Sensing Data via Tree  Tree Expansion and Pruning 9 As target moves, some nodes far away from target are pruned Root should predict target moving direction and activate right group of sensor node

Telecommunication System & Internet Security Lab. Overview of DCTC  Dynamic Convoy Tree-based Collaboration  Tree Reconfiguration if necessary 10 As target moves, many nodes become far away from target and energy may be wasted To reduce overhead, root should be replaced by node closer to the center of monitoring region

Telecommunication System & Internet Security Lab. Overview of DCTC  Problem of Optimizing Tree Reconfiguration  Total energy in convoy tree sequence  Convoy tree sequence  As trees are reconfigured, a sequence of trees exists at different data collection time  Optimizing tree reconfiguration = finding min-cost convoy tree sequence 11 Data collection Tree reconfiguration

Telecommunication System & Internet Security Lab.  Introduction  Overview of DCTC  Optimizing TR Schemes  Root Replacement  OCR(Optimized Complete Reconfiguration)  OIR(Optimized Interception-based Reconfig.)  Performance Evaluation  Conclusion 12

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Reconfiguration of convoy tree  Convoy tree is reconfigured in two step 13

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Reconfiguration of convoy tree  Convoy tree is reconfigured in two step 14

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Root Replacement  Rule Root predicts L t+1 (t+1 : next data collection time) 2. Distance check (dr : threshold) 3. Determine Root change (R→R’ )

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Root Replacement  Rule Send message grid head 5. Grid head select new root (the node closest to L t+1 ) New Root Old Root 1.Tree have a short height and small energy consumption during data collection 2.Root that is far away from sensing node may consume lots of network bandwidth and power to send data

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Generic Method for Optimizing d r  Overall energy consumption = data collection + tree reconfiguration  Selecting appropriate value for d r is important  Large d r → high overhead for data collection  Small d r → high overhead for tree reconfiguration  Selecting Optimal d r → minimizes overall energy consumption 17

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Generic Method for Optimizing d r  Average energy consumption during k(v) 18 : root replacement occurring time : data collection overhead (energy consumption) (distance between root and target is x) : target moving velocity : tree reconfiguration overhead (energy consumption) (distance between root and target is x)

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Generic Method for Optimizing d r  To minimize →  Nodes do not have to compute k(v) on-line  The function can be calculated off-line and distributed to the related sensor node  In the following section..  For computing k(v)  Describe how to compute E d (x), E t (x) in OCR, OIR 19

Telecommunication System & Internet Security Lab.  Introduction  Overview of DCTC  Optimizing TR Schemes  Root Replacement  OCR(Optimized Complete Reconfiguration)  OIR(Optimized Interception-based Reconfig.)  Performance Evaluation  Conclusion 20

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Optimized Complete Reconfiguration (OCR)  OCR scheme  Reconfigures all nodes in the tree 21 After complete reconfiguration Before complete reconfiguration After root replacement Broadcast reconf(R, R’)

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Optimized Complete Reconfiguration (OCR)  OCR scheme  Algorithm executed by root R’ 22 drdr

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Optimized Complete Reconfiguration (OCR)  OCR scheme  Algorithm executed by node i in the tree 23 drdr : set of neighbors of node i : parent of node i : children of node i : message to init tree reconfig. : message to detach i from Pi : message to attach i to j Ni 중 R’ 과의 거리가 최소가 되는 노드

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Optimized Complete Reconfiguration (OCR)  Overhead Analysis (Data Collection)  Energy consumed to send report to R from node P(x, y)  Energy consumed by data collection 24 # of hop (using (A2)) node density # of hop in the area data report size (A2) # of hop between two nodes is proportional to geographic distance

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Optimized Complete Reconfiguration (OCR)  Overhead Analysis (Tree Reconfiguration)  Reconfiguration occurs exactly when  Each node sends detach message to old parent  Each node sends attach message to new parent  Energy consumed by tree reconfiguration 25 control message size

Telecommunication System & Internet Security Lab.  Introduction  Overview of DCTC  Optimizing TR Schemes  Root Replacement  OCR(Optimized Complete Reconfiguration)  OIR(Optimized Interception-based Reconfig.)  Performance Evaluation  Conclusion 26

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Optimized Interception-Based Reconfig. (OIR)  OIR scheme  Only reconfigures a small part of the tree 27 After interception based reconfig. Process of interception-based reconfig. After root replacement Broadcast reconf(R, R’) between (l 0, l 1 ) in morintoring region

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Optimized Interception-Based Reconfig. (OIR)  OIR scheme  Algorithm executed by root R’ 28 E d (x), E t (x) is calculated by Eq(11), Eq(12)

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Optimized Interception-Based Reconfig. (OIR)  OIR scheme  Algorithm executed by node i in the tree 29 drdr and between (l 0, l 1 ) in morintoring region

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Optimized Interception-Based Reconfig. (OIR)  Overhead Analysis (Data Collection)  For nodes between lines l 0 and l 1  Energy consumed to collect data (P 0 locates between l 0 and l 1 ) 30 # of hop (between P 0, R)

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Optimized Interception-Based Reconfig. (OIR)  Overhead Analysis (Data Collection)  For nodes on the left side of l 1  Path between P 1 and R may not be optimized  Energy consumed to collect data (P 0 locates left side of l 1 ) 31 n is small → c 1 is small (c 1 = 1.1 in this paper)

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Optimized Interception-Based Reconfig. (OIR)  Overhead Analysis (Data Collection)  For nodes on the right side of l 0  Similar to previous case  Path between P 2 and R may not be optimized  Energy consumed to collect data (P 2 locates right side of l 0 ) 32

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Optimized Interception-Based Reconfig. (OIR)  Overhead Analysis (Data Collection)  Energy consumed by data collection 33

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Optimized Interception-Based Reconfig. (OIR)  Overhead Analysis (Tree Reconfiguration)  Reconfiguration occurs exactly when  Each node within l 0, l 1 sends detach msg. to old parent  Each node within l 0, l 1 sends attach msg. to new parent  Energy consumed by tree reconfiguration 34

Telecommunication System & Internet Security Lab. Optimizing TR Schemes  Comparison between OCR & OIR  OCR and OIR take different approaches to optimize overall energy consumption  OCR : higher priority to data collection  OIR : higher priority to tree reconfiguration  OIR outperforms OCR when velocity is high, s d /s c or d s /d c is small  High velocity : OIR has smaller tree reconfig. overhead  s d /s c small : OIR has smaller data collection overhead  d s /d c small : OIR has smaller data collection overhead 35

Telecommunication System & Internet Security Lab.  Introduction  Overview of DCTC  Optimizing TR Schemes  Performance Evaluation  Energy Consumption Results  Data Collection Delay  Impact of Movement Prediction Accuracy  Conclusion 36

Telecommunication System & Internet Security Lab. Performance Evaluation  Simulation  Evaluate performance of proposed schemes  Compare to other non-optimized reconf. scheme  Non-optimized reconfiguration schemes 37

Telecommunication System & Internet Security Lab. Performance Evaluation  Energy Consumption Results  Comparing Energy Consumption  Varying v, s d /s c and d s /d c  As v increase → energy consumption increases  OCR > ACR > CCR, OIR > AIR > ACR  CCR > CIR  Tree reconf. frequency is low → Data collection dominates  AIR > ACR  Tree reconf. frequency is high → Tree reconf. dominates  OIR > OCR (s d /s c,d s /d c : small)  OCR > OIR (s d /s c,d s /d c : large) 38

Telecommunication System & Internet Security Lab. Performance Evaluation  Data Collection Delay  Frequent reconfiguration reduce height of tree  ACR > OCR > CCR, AIR > OIR > CIR  Compared to CR, IR changed small part of tree → larger height  ACR > AIR, OCR > OIR, CCR > CIR  Data collection delay of OIR and OCR are not optimal  But, difference to the optimal value is reasonable 39

Telecommunication System & Internet Security Lab. Performance Evaluation  Impact of Movement Prediction Accuracy  Simulation Model  Every 10sec, target may change its moving direction and/or velocity  With probability p k, the direction and velocity of target keep unchanged  Simulation Results  As pk drops, energy consumption increases  As pk drops, the chance of wrong prediction increases → Increasing reconfiguration overhead  Energy consumption does not increase too much if pk is not very low 40

Telecommunication System & Internet Security Lab.  Introduction  Overview of DCTC  Problem of Optimizing Tree Reconfiguration  Optimizing TR Schemes  Performance Evaluation  Conclusion 41

Telecommunication System & Internet Security Lab. Conclusions  Optimizing tree reconfiguration when target moves  Formulize as finding min-cost convoy tree seq.  Solved it by proposing  OCR (Optimized Complete Reconfiguration)  Minimize data collection energy  OIR (Optimized Interception-based Reconfiguration)  Minimize tree reconfiguration energy  OCR, OIR optimizes by selecting appropriate root replacement threshold to minimize energy  Simulation results, Optimized schemes are better  OIR outperforms OCR when s d or s c is small 42